cybersecsi / houdini
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
β1,234Updated last year
Alternatives and similar repositories for houdini:
Users that are interested in houdini are comparing it to the libraries listed below
- A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.β549Updated this week
- π A curated list of awesome Docker security resourcesβ663Updated 4 months ago
- A Blazing fast Security Auditing tool for Kubernetesβ996Updated 11 months ago
- Granular, Actionable Adversary Emulation for the Cloudβ1,962Updated last week
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, β¦β952Updated last year
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized enβ¦β1,157Updated last month
- all paths lead to cloudsβ638Updated last year
- A curated list of awesome CI CD security resourcesβ540Updated 4 months ago
- Automated Red Team Infrastructure deployement using Dockerβ1,234Updated 2 years ago
- β565Updated 2 years ago
- This repo has been replaced by https://www.cloudvulndb.orgβ724Updated 2 years ago
- π‘οΈ Awesome Cloud Security Resources βοΈβ2,153Updated 4 months ago
- Automating situational awareness for cloud penetration tests.β2,059Updated 2 weeks ago
- Peirates - Kubernetes Penetration Testing toolβ1,298Updated 2 weeks ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!β2,087Updated 5 months ago
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assetsβ798Updated this week
- AWSGoat : A Damn Vulnerable AWS Infrastructureβ1,814Updated last month
- π¦π Awesome list of secrets in environment variables π₯οΈβ881Updated 2 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRsβ1,170Updated last month
- Automated pentest reporting with custom Word templates, project tracking, and client management tools. Streamline your security workflowsβ¦β837Updated 3 weeks ago
- NMAP Vulnerability Scanning Scriptsβ627Updated 3 years ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)β1,288Updated last month
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web servicesβ487Updated 2 years ago
- Real-time HTTP Intrusion Detectionβ3,047Updated last year
- A log4j vulnerability filesystem scanner and Go package for analyzing JAR files.β1,568Updated 2 years ago
- A Microservices-based framework for the study of Network Security and Penetration Test techniquesβ592Updated 6 months ago
- OWASP dep-scan is a next-generation security and risk audit tool based on known vulnerabilities, advisories, and license limitations for β¦β1,077Updated last week
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.β2,043Updated 8 months ago
- Checklist for container security - devsecops practicesβ1,551Updated last year
- A curated list of awesome Kubernetes security resourcesβ915Updated last year